[24023] in bugtraq

home help back first fref pref prev next nref lref last post

Re: sastcpd Buffer Overflow and Format String Vulnerabilities

daemon@ATHENA.MIT.EDU (elliptic)
Tue Jan 29 13:35:19 2002

Date: Tue, 29 Jan 2002 10:54:38 -0700 (MST)
From: elliptic <elliptic@localhost.localdomain>
To: bugtraq@securityfocus.com
Message-ID: <Pine.LNX.4.44.0201291050220.23931-100000@localhost.localdomain>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII

> "SAS software provides the foundation, tools, and
> solutions for data analysis, report generation,
> and enterprise-wide information delivery."
> 
> The "SAS Job Spawner", sastcpd, contains both a buffer
> overflow and a format string vulnerability.
> 
> SAS Support say that these problems were fixed in version
> 8.2 of this product, but we are unable to confirm as we
> do not have access to this version.

This problem appears to be addressed by the following product note:
http://www.sas.com/service/techsup/unotes/SN/004/004201.html

Some additional information Digital Shadow neglected to include:

sastcpd is part of the SAS/Base component.  Although I neither work for 
SAS, nor do I use their product on a regular basis, I'd assume this means 
the scope of exposure is broad.

Additionally, it appears that the objspawn program included with the 
SAS/Integration Technologies product is also vulnerable to these bugs.  
objspawn is also a setuid root executable by default.  See the above link 
for more information.

Cheers,
ellipse



home help back first fref pref prev next nref lref last post